Performance Evaluation of A Reverse Aodv And Aodv Routing Protocol Under Jellyfish Attacks in Mobile Ad Hoc Network

Authors

  • M. A. Azeez Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
  • O. Oluwaseyi Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
  • A. A. Ajiboye Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria
  • A. Iwayemi Mechanical Engineering Department, The Federal University of Technology, Akure, Ondo State, Nigeria

Keywords:

RAODV, AODV, Jellyfish Attack, manet, protocol

Abstract

Mobile Ad hoc network (MANET) is an example of mobile wireless network characterized by dynamic topology, self-organization, auto-configuration, lack of infrastructure and decentralize administrator that made it more useful in military battlefield, smart building and emergency rescue. The nodes vulnerability in MANET security becomes the center of creative research efforts. Many security schemes were proposed, rather than trying to encompass the entire field of MANET security. In this paper the same security issue was addressed by evaluating the performance of two reactive protocols Ad-hoc On-demand Distance Vector (AODV) protocol and Reverse Ad-hoc On-demand Distance Vector under jellyfish attacks. This research adopts the use of Network simulator 2.35 to test the two reactive protocols vulnerability in the presence of jellyfish attacks. The results of the performance metrics shown that the two protocols average throughputs were affected in the presence of the attacks and increase tremendously as the number of node increases, while packet delivery ratio decrease with increase in number of malicious nodes. The jellyfish attacks have great effect in number of packet drop in the protocols. Less packet drop in the presence of single jellyfish but greatly increase as more threats were introduced and maintain the increase rate as the number of attacks increase. The experimental results for all scenarios shown that the higher the jellyfish attacks on AODV and RAODV the lower the performance of the two protocols.

References

Akanksha S. and Kumar (2010) “Effect of Black Hole Attack On AODV Routing Protocol In MANET”. International Journal of Computer and Telecommunication. Vol. 1, Issue 2 pg. 148

Chetana K. (2013) “Black Hole Node Detection in AODV” International Journal of Computational Engineering Research. Vol, 03, Issue, 6, pg 79.

Esmaili et al (2011) “Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator”. Computer Science and Information Technology Journal Vol.1, No.2, pg49-52.

Hetal P., Minubhai. B. (2010) "Survey: Impact of Jellyfish On Wireless Ad-Hoc Network", in proceeding of INJCR'10, Volume.10, issue.5, no.2 pg. 5-9.

Kamanshis B. and Liakat A. (2007) “Security Threats in Mobile Ad Hoc Network”. Interaction and System Design, School of Engineering, Blekinge Institute of Technology.

Pratibha Kaswan and Deepika Gupta (2013) “Impact Analysis of Wormhole and Black hole attacks over Mobile Ad Hoc Networks”. Computer Science and Information Technology Journal. Volume: 1 Issue: 12, pg

Rehman, I. (2010) “Analysis of Black Hole Attack on MANETs, Using Different MANET Routing Protocols”, School of Computing, Bleking Institute of Technology.

Sanabani M. et al (2014) “A Reverse and Enhanced AODV routing protocol for MANETS”. ARPN Journal of Engineering and Applied Sciences. Vol 9, No 2, pg 11.

Tanwar S., Prema K.V. (2013) “Threats & Security Issues in Ad hoc network: A Survey Report”. International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue 6, pg 1-6.

Downloads

Published

2019-05-03